Communications

Pursuant to the Ohio Open Records Law, I hereby request the following records:

The following request is in regards to mobile phone forensics tools such as devices made by the company Cellebrite, IP Box made by MDSec, Secure View by Susteen Inc., Kessler Innovations products, Binary Intelligence products or analysis programs such as those produced by COMPELSON Labs or the XRY software by MSAB.

-Contractual documents. Examples of this are invoices, purchases orders, contracts, loan agreements, procurement documents etc.-Records of communication with the domains CellebriteUSA.com, investigation.com, or mdsec.net from either the chief of police or head of procurement.-guidelines and/or internal policy on the use of mobile phone forensics tools and software-Any utilization logs for these tools

The requested documents will be made available to the general public, and this request is not being made for commercial purposes.

In the event that there are fees, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM if not.

Thank you in advance for your anticipated cooperation in this matter. I would request your response within ten (10) business days.

I wanted to follow up on the following Freedom of Information request, copied below, and originally submitted on March 29, 2017. Please let me know when I can expect to receive a response, or if further clarification is needed.

Thanks for your help, and let me know if further clarification is needed.

I wanted to follow up on the following Freedom of Information request, copied below, and originally submitted on March 29, 2017. Please let me know when I can expect to receive a response, or if further clarification is needed.

Thanks for your help, and let me know if further clarification is needed.

Mr. Waltman, Attached is a copy of the contract we have for the company involving Cellebrite. It is up for renewal sometime this summer. At this time, this is the only company we use and have a contract with. The way it has been explained to me, there are several people on the police department that have gone to the training and are the only ones able to use this tool, so it is used by homicide, narcotics, computer crimes etc. At this time there is no log kept and no guidelines or internal policies. It is only used by the people who have been trained and they would be the only ones who have access to it.